Te chnical presentation networkexploits and security

273 views
198 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
273
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Te chnical presentation networkexploits and security

  1. 1. TECHNICAL PRESENTATION ON“NETWORK EXPLOITS AND SECURITY” Presented byKartik Rao Gagandeep RandhawaFrom FromNDMVP COE MET IOT-Poly Nasik
  2. 2. CONTENTS• Network Security issues.• How network gets exploited ?• How to protect against these exploits?• Some recent incidents.
  3. 3. INTERNET OVERVIEW “Largest Data network on the
  4. 4. WHY SECURITY IS NEEDED ? “Evolving network trends are driving the need for better Security”
  5. 5. THREATS “After all, just one threat on a computer is one too many.”
  6. 6. COMMON THREATS •Viruses •Worms •Trojan horse •Hackers •Spyware •Malware
  7. 7. EXPLOITING VULNERABILITIES A vulnerability is a weakness which allows an attacker to reduce a systems information assurance.
  8. 8. TROJAN HORSE NETBUS 1.70 :
  9. 9. NETBUS 1.70
  10. 10. OTHER FAMOUS TROJAN
  11. 11. WAR DRIVING “Used to Hack the Wi Fi Network”
  12. 12. SQL INJECTON SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application.
  13. 13. SPAMMING
  14. 14. FAMOUS METHOD“Way of attempting to acquire sensitive information such asusernames, passwords and credit card details by masquerading asa trustworthy entity in an electronic communication.”
  15. 15. YAHOO FAKE PAGE
  16. 16. FACEBOOK FAKE LOGIN PAGE
  17. 17. SECURITY MEASURESOkay -- now that the problem has been layed out, how is it going to be solved?
  18. 18. FIREWALLS
  19. 19. ENCRYPTIONEncryption is the process of transforming information (referred toas plaintext) using an algorithm(called cipher) to make it unreadable to
  20. 20. STEGANOGRAPHY “Hiding data inside a image file or any graphic file.”
  21. 21. HONEYPOT SYSTEM “It is a trap set to detect unauthorized users”
  22. 22. PASSWORD PROTECTION “Treat your password like your toothbrush. Dont let anybody else use it, and get a new one every one month.”
  23. 23. ANTI VIRUS PACKAGE
  24. 24. CONCLUSIONS
  25. 25. REFRENCES Books: Network security principles and practices by Saadat Malik Network security: the complete reference by Roberta Bragg Network Security Hacks by Andrew Lockhart Hacking exposed 6 by Stuart Mc Curle Links : http://www.networkworld.com/topics/security.html http://isc.sans.org/ http://www.interhack.net/pubs/network-security/ http://www.networksecurityjournal.com/ http://www.esecurityplanet.com/views/
  26. 26. QUESTIONS ?
  27. 27. THANK YOU
  28. 28. EXAMPLE This SQL code is designed to pull up the records of the specified username from its table of users: statement = "SELECT * FROM `users` WHERE `name` = " + userName + ";“For example, setting the "userName" variable as: or 1=1Renders this SQL statement by the parent language:SELECT * FROM `users` WHERE `name` = OR 1=1; True always

×